DiscoverBreakpoint Security Podcast
Breakpoint Security Podcast
Claim Ownership

Breakpoint Security Podcast

Author: Neelu Tripathy

Subscribed: 9Played: 14
Share

Description

Breakpoint-'Exploring the depths of Defensive Security'. The defensive side of Security is a world in itself with teams achieving amazing feats that involve excellent engineering practices and smart optimisation for scale. This is not talked about enough in the industry. Join me in the br3akp0int podcast as we reflect on the methods and approaches these smart teams use to solve practical challenges in information security and innovate their way into the future. Who is this meant for? : This podcast is for anyone in InfoSec willing to know more about advances in security techniques. This includes security researchers or professionals, product owners, compliance or cloud, AI/ML, threat intel, SecOps automation, Security Leaders, development teams, pentesters and security practitioners. A bit about me: I am a technical security enthusiast and have been dabbling my hands at both offensive and defensive security. I am passionate about growing security communities and have spoken and trained at various security conferences.

66 Episodes
Reverse
Vulnerability Management & Remediation Guest: Vishal Kalro, CISO & DPO, Quatiphi In this episode of Breakpoint, Neelu and Vishal discuss the complexities of #vulnerabilitymanagement and #remediation in #cybersecurity. They explore the challenges faced by #security teams in identifying and prioritizing vulnerabilities, the importance of collaboration with development teams, and how to tie #vulnerabilities to business #risks. Vishal emphasizes the need for actionable insights and...
Vulnerability Management & Remediation Guest: Vishal Kalro, CISO & DPO, Quatiphi The real security flaw isn't the vulnerability itself, it's the failure to execute remediation. Security teams are drowning in thousands of alerts and treating every bug like a Critical emergency. This "Alert Fatigue" guarantees that the actual high-risk exposures get missed, leaving the door wide open for the successful breach. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoin...
Guests: Mohini Sharma, TMT Technology Consultant, EY. Jaydeep Katariya, AMI Technology Consultant, EY. The metaverse seamlessly integrates physical and digital spaces, enabling AI-driven innovations in virtual interactions, autonomous avatars, and real-time experiences. However, increased reliance on AI brings sweeping cybersecurity challenges, such as adversarial attacks, deep fake impersonation, and AI-driven phishing campaigns. The security of the metaverse is vital for the sustainabilit...
As organisations and users increasingly move into the metaverse, AI-powered threats are evolving faster than traditional defences. The primary challenge for today’s security teams is that conventional detection and manual response are too slow for the millisecond-scale attacks of immersive environments. Their work on DAI-TIRS addresses this problem by integrating anomaly detection, adversarial AI defence, dynamic honeypots, and predictive threat modelling into a unified system for me...
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd In this Rapidfire Anant shares insights from his experiences in the field of both Supply Chain Security and his professional journey in Cybersecurity. Checkout the full episode where we discuss these practical nuances of SBOMs, so you get the best out of your 'bill of materials'. https://youtu.be/PwuJoABJfmc ------ Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe f...
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd Implementing Software Bill of Materials (SBOMs) is a complex process riddled with challenges that can undermine their security benefits. The primary issue is data quality and accuracy, as many tools fail to list all components, especially hidden transitive dependencies, creating a false sense of security. Furthermore, organizations are often overwhelmed by the sheer volume of data an SBOM produces, lack...
From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne This short clip is fun, fast, and full of great personal insights on #cybersecurity . It’s a great reminder that behind every strong security defense is a brilliant, interesting human. #bugbountytips -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: S...
TOPIC:From Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Stop viewing bug bounties as just a headache! We're talking about turning #vulnerabilities into measurable #security value. My guest dives deep into how organizations can strategically shift their perspective: using #crowdsourced security intelligence as a core engine for #continuous improvement. It’s about leveraging these programs to generate critical #threatintelligence and #risk data. Eve...
TOPICFrom Vulnerability to Value: Harnessing Bug Bounties for Continuous Security Improvement Guest: Shobhit Gautam, HackerOne, Staff Security Solutions Architect, HackerOne Shobhit is a Staff Solutions Architect at HackerOne. He has 15+ years of security experience, with extensive expertise in application, cloud, and infrastructure security. He is passionate about building secure solutions and fostering a security-conscious culture. He has experience leading security awareness initiatives, m...
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene We talked serious **DPDP Act** compliance in the full episode, but now it's time for the fun stuff! 🚀 I put our expert through the wringer with our rapid-fire round. --- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcast Subscribe for Video on YouTube: Subscribe: https://www.youtube.com/@BreakpointSecurityPodcast?sub_confirmation=1 If you like to se...
Guest: Saakshar Duggal, Artificial Intelligence Law Expert I Training Corporates on Cyber laws and Cyber Hygiene The DPDP Act is here, redefining digital privacy in India. But how does this new law stack up against global standards like GDPR? We're diving deep into the toughest differences and the biggest headache for every business: Consent Management. Beyond specific, informed consent and the constant right to withdraw, we tackle Data Minimization and the ambiguity of Data Retention rules....
The new DPDP Act is officially rewriting the rules for handling personal data in India. It sounds like simple compliance, but the implementation challenges for every data fiduciary are tricky—and getting it wrong could lead to massive fines. Today, we dive into the biggest hurdles, from consent management to fulfilling data principal rights. We guide you through the precise techniques you need to roll out DPDP successfully. Don't risk your organization's future—check out the full episode! G...
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance At Breakpoint, we tend to get real about cybersecurity. We often say security's job is to be an enabler for the business. After the myth breaking full episode, here's a light Rapid Fire where Jay shares some of his experiments on chaos engineering and other interesting adventures. -- Follow us on LinkedIn: https://www.linkedin.com/company/breakpoint-security-podcas...
Guest: Jay Thoden van Velzen Technical Advisor, Office of the Chief Security Officer SAP Global Security & Cloud Compliance In this segment, we’re unpacking the biggest myth in security: that strategy is enough. Our guest argues that culture eats strategy for breakfast, and effective security isn’t about more policies, but about deep negotiation and understanding. We’ll discuss how to use tools like security risk management and security engineering not as blockers, but as instruments for...
Guest: Dennis Giese, Independent Security Researcher You've seen the headlines, heard the wild stories, and maybe even panicked about the devices in your own home. "Hackers take control of robot vacuums, yell racial slurs." It sounds insane, but what really happened? Our guest today is one of the researchers who exposed the vulnerabilities behind these shocking incidents. In this segment, we're diving deep into the world of smart home robotics and cyber-physical security. Our guest wi...
Have you ever thought about how an attacker might reverse-engineer an AI model? Our guest today is doing just that, going beyond passwords and keys to unpack the very DNA of deep learning! In this segment, we're diving into the groundbreaking work of reversing large deep learning models. Our guest reveals how it's possible to reverse an AI model's entire mathematical structure, exposing its architecture, critical hyperparameters, and even the internal weights and biases that define its behav...
Ever wonder how zero-day vulnerabilities in your favorite websites get uncovered? Our guest today is diving into a game-changing technique: coverage-guided fuzzing for PHP web apps! Forget slow scanners; we're talking about finding critical bugs before the bad guys do. Guest: Sebastian Neef, PhD at the Technical University of Berlin, at the Chair for Security in Telecommunications In this segment, we explore PHUZZ, an open-source tool that's shaking up web application security testing. Our ...
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Dr Angelina Gokhale Senior Data Scientist, Netmonastery Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
Imagine an AI agent managing your life. Sounds cool, right? But what if it gets hacked? We're exploring the future of AI agents and the critical need for their security. As the first installment, we share this fun series where we ask our guests to share 'What they would like their Agents to do for them' :) Guest: Khushbu Jain Managing Partner, Data Privacy | Ark Legal Agents have the potential for handling finances, travel, even critical health data. But with that power comes immense risk....
loading
Comments